Analysis

  • max time kernel
    149s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 20:13

General

  • Target

    2171fef7d1d6427a9d710e2e82e485bb3c9f0c098801aca1ae592d2849efc303.exe

  • Size

    48KB

  • MD5

    1c6454eae1b9c041d41332fc9c27de92

  • SHA1

    277388dc0c7b76f2a20dd01467f1b53e1059dc58

  • SHA256

    2171fef7d1d6427a9d710e2e82e485bb3c9f0c098801aca1ae592d2849efc303

  • SHA512

    8079b8ccd9690c9c404611b5bb9391cadba27b56ea99f4221015b61839c150e124e905e01d86272ad85cb54621cac33ac372b3a54922a12ef10457026e8605e0

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI98j:V7Zf/FAxTWoJJ7Ta

Malware Config

Signatures

  • Renames multiple (5202) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2171fef7d1d6427a9d710e2e82e485bb3c9f0c098801aca1ae592d2849efc303.exe
    "C:\Users\Admin\AppData\Local\Temp\2171fef7d1d6427a9d710e2e82e485bb3c9f0c098801aca1ae592d2849efc303.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    ac623e5d78319abfbd8a60e4b92abfbd

    SHA1

    e7c2285b9b2bdeeaaad31e9b6aedc92e16e09b5d

    SHA256

    a9232c94f1f454e4e3de530ddd77f28bd7efa601821f19b795629c37009b918e

    SHA512

    747f57774208ab5f96f84fe69d42903e5b96279688c0da33554b52a03e2ece2ff759c115eeab46d846253905646fe989b0e2b0f9bb03057bf4d8847bedece3ed

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    147KB

    MD5

    c417c32f713d8af346f12a4d0f2e40a3

    SHA1

    cd239e9957c9a587502638ccbb9053ec76ffddd0

    SHA256

    a80ed950f5868e5c09836bca5bf93d1fe11708a61a9f5a05052f8dcf49b5a344

    SHA512

    f7916b4313aba358065328203b698723bc327373702ce038d47c5a404423729fef0bc909b2522e5ef49775f75248d4eef3ce0d1d2802224d172d1735982ad31f

  • memory/4020-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4020-920-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB